Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311552
Recommendations
- Short threshold dynamic group signatures
- Short Group Signature Without Random Oracles
- Short undeniable signatures based on group homomorphisms
- Group Signatures
- Short group signatures with distributed traceability
- Dynamic fully anonymous short group signatures
- Short randomizable signatures
- Short structure-preserving signatures
- Short tightly secure signatures for signing a vector of group elements: a new approach
Cited in
(only showing first 100 items - show all)- A practical group signature scheme based on rank metric
- Efficient Tate pairing computation using double-base chains
- Compact Group Signatures Without Random Oracles
- Unlinkable Randomizable Signature and Its Application in Group Signature
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Leakage resilience from program obfuscation
- Towards restricting plaintext space in public key encryption
- Attribute-based signatures for range of inner product and its applications
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Short Undeniable Signatures Without Random Oracles: The Missing Link
- An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation
- Privacy-Aware Attribute-Based Encryption with User Accountability
- ATSSIA: asynchronous truly-threshold Schnorr signing for inconsistent availability
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- A scalable post-quantum hash-based group signature
- Scalable multi-party private set-intersection
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Updatable NIZKs from non-interactive zaps
- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption
- Offline witness encryption with semi-adaptive security
- Group homomorphic encryption: characterizations, impossibility results, and applications
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Shorter ring signatures from standard assumptions
- A black-box construction of strongly unforgeable signature scheme in the leakage setting
- Still wrong use of pairings in cryptography
- Leakage-resilient group signature: definitions and constructions
- Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
- Non-zero inner product encryption with short ciphertexts and private keys
- A dynamic attribute-based authentication scheme
- Efficient selective identity-based encryption without random oracles
- Dynamic fully anonymous short group signatures
- Attribute-based encryption schemes with constant-size ciphertexts
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
- Information and Communications Security
- Hidden-Vector Encryption with Groups of Prime Order
- No-signaling linear PCPs
- Survey of lattice-based group signature
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
- Adequate elliptic curves for computing the product of \(n\) pairings
- Security Analysis of the Strong Diffie-Hellman Problem
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Practical Short Signature Batch Verification
- Anonymous yet Traceable Strong Designated Verifier Signature
- Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting
- Pairings in Trusted Computing
- Fully secure functional encryption for inner products, from standard assumptions
- A shuffle argument secure in the generic model
- NIZKs with an untrusted CRS: security in the face of parameter subversion
- Computing on authenticated data
- Algebraic curves and cryptography
- CCA-secure inner-product functional encryption from projective hash functions
- Smooth NIZK arguments
- Multilinear maps from obfuscation
- Structure-preserving signatures and commitments to group elements
- A lattice-based group signature scheme with verifier-local revocation
- Minicrypt primitives with algebraic structure and applications
- How to protect privacy in optimistic fair exchange of digital signatures
- Group-oriented fair exchange of signatures
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
- Deterministic Public-Key Encryption Under Continual Leakage
- DualDory: logarithmic-verifier linkable ring signatures through preprocessing
- Secure simultaneous bit extraction from Koblitz curves
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- A comparison of MNT curves and supersingular curves
- The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Inner-product encryption under standard assumptions
- Tightly secure signatures and public-key encryption
- Verifiable elections that scale for free
- Threshold signatures with private accountability
- Cryptographic assumptions: a position paper
- Linear encryption with keyword search
- Structure-preserving smooth projective hashing
- Fully Anonymous Group Signatures Without Random Oracles
- zk-SNARKs from codes with rank metrics
- Short Group Signature Without Random Oracles
- Private polynomial commitments and applications to MPC
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares
- On computable isomorphisms in efficient asymmetric pairing-based systems
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- A survey on functional encryption
- Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
- Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- The kernel matrix Diffie-Hellman assumption
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures
- Distributed broadcast encryption from bilinear groups
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Forward-Secure Group Signatures from Pairings
- Efficient oblivious transfers with access control
- Anonymous Data Collection System with Mediators
- Short attribute-based signatures for threshold predicates
- Multilinear maps from obfuscation
- An efficient self-blindable attribute-based credential scheme
This page was built for publication: Advances in Cryptology – CRYPTO 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311552)